Infosecurity Opinions

  1. Strengthening Your Digital Core

    If your digital core is weak, what gets thrown off is your organization’s ability to maintain operations, serve customers and generate revenue.

    1. Photo of Thomas MacIsaac

      Thomas MacIsaac

      Cybersecurity strategist, SSH Communications Security

  2. Halfway Through 2018, is This the Year of the Insider Threat?

    Insider threats range from unintentional errors and compromised credentials, to a lack of basic cybersecurity hygiene, all the way through to malevolent insiders.

    1. Photo of Dr Jamie Graves

      Dr Jamie Graves

      Founder and CEO ZoneFox

  3. The Dawn of a New Digital Era for Healthcare Organizations

    With the NHS ready to adopt cloud technology, could this better protect UK healthcare?

    1. Photo of Chris Hill

      Chris Hill

      RVP Public Cloud, Barracuda

  4. The Two-Step Process to Fix the Internet's Identity Problem

    Two steps to get over the internet's identity problem.

    1. Photo of James Stickland

      James Stickland

      CEO of Veridium

  5. Will a New SOC Help the NHS Stop the Next WannaCry?

    The implementation of an SOC is a firm step in the right direction for the NHS, but it must provide the visibility and secure access required for a massive operation like the NHS.

    1. Photo of Scott Gordon

      Scott Gordon

      InfoSec Evangelist, Pulse Secure

  6. From Zero Day Attack to Zero Day Recovery

    With Zero Day Recovery, data can be recovered quickly, minimizing or even eliminating the damage that a destructive cyber-attack would have caused the business.

    1. Photo of Marie Clutterbuck

      Marie Clutterbuck

      Chief Marketing Officer, Tectrade

  7. Advanced Persistent Agony: Fixing the Broken Data Breach Response Template

    The standard response playbook to a major data breach is harmful to security professionals.

    1. Photo of Matt Cauthorn

      Matt Cauthorn

      VP of Security for ExtraHop

  8. How to Balance Security with Digital Transformation

    IT security professionals are struggling to keep up with the technologies that drive digital transformation.

    1. Photo of Bob Egner

      Bob Egner

      VP at Outpost24

  9. Overcoming the Siloed Network Security Challenge

    Unlike IT teams, cyber-criminals aren’t constrained by lines of business, siloed technology teams, or carefully guarded network domains.

    1. Photo of Steve Mulhearn

      Steve Mulhearn

      Director of Enhanced Technologies, Fortinet

  10. The New Age of Accountability

    Accountability refers to an obligation on individuals and businesses to be held responsible for their data protection actions and activities, and to accept liability for data breaches.

    1. Photo of Howard Williams

      Howard Williams

      Marketing Director, Parker Software

  11. Security AI is more than an Algorithm

    All analytics will be more effective when provided with rich, high-fidelity sources of data.

    1. Photo of Barbara Kay

      Barbara Kay

      Senior Director of Security, Extrahop

  12. Is Sandboxing a Playground for Browser-Borne Threats?

    Given today’s evasive threats, will sandboxing be considered an adequate form of security for much longer?

    1. Photo of Ilan  Paretsky

      Ilan Paretsky

      Chief Marketing Officer at Ericom Software

  13. Phishing in the Deep End: The Growing Threat of Attacks Beyond Email

    The primary target has now become the unsuspecting person using these devices and systems.

    1. Photo of Atif Mushtaq

      Atif Mushtaq

      CEO of SlashNext

  14. Mitigating IoT Cyber Risks: Training is the First Step

    Roles which five years ago we would never have thought of as requiring cybersecurity training, will need it as adoption of connected devices continues to rise.

    1. Photo of Guy Bunker

      Guy Bunker

      SVP of Products, Clearswift

  15. It Started with a Phish

    The four key elements of an anti-phishing program.

    1. Photo of Todd O’Boyle

      Todd O’Boyle

      Director of product management at WatchGuard Technologies

  16. Are Bug Bounty Programs the Answer to Secure Endpoints?

    Like with any security protection, don’t just rely on one form – bug bounties aren’t a silver bullet.

    1. Photo of Marcin Kleczynski

      Marcin Kleczynski

      CEO and co-founder of Malwarebytes

  17. Shrouding IoT Security in the Fog

    By virtue of its distributed architecture, fog computing secures everything from the cloud to the device.

    1. Photo of Frank Michaud

      Frank Michaud

      Co-chair of the OpenFog Security Working Group

    2. Photo of Dr John Zao

      Dr John Zao

      Co-chair of the OpenFog Security Working Group

  18. Protecting a Mobile Workforce with Hybrid DNS Security

    The root of many of data breaches, and the damage and stress that accompanies them, lies the DNS.

    1. Photo of Gary Cox

      Gary Cox

      Technology Director, Western Europe at Infoblox

  19. Eight Weak Links that Make Cryptocurrency Exchanges Vulnerable

    The security of cryptocurrency is irrelevant if the exchange in which it is stored it is not secure.

    1. Photo of Sameer Dixit

      Sameer Dixit

      Senior Director, Security Consulting, Spirent Communications

  20. Nice Quotes, But I Wouldn’t Take Cybersecurity Advice from Alphonse Karr

    Changes are both the enemy and the ally of cybersecurity, but in both cases, it is absolutely not the case that security is unaffected by change.

    1. Photo of Mark  Kedgley

      Mark Kedgley

      CTO at NNT

What’s hot on Infosecurity Magazine?